Print Friendly, PDF & Email

(Washington, D.C.): A highly classified U.S. operation that promised to provide important — perhaps even geopolitically explosive — insights into Communist China’s international conduct is suddenly compromised. As a result, Beijing is spared the embarrassment, or worse, that might have followed. So is a United States government anxious to improve relations with the PRC.

This could describe the sensational news that Chinese President Jiang Zemin’s security services last fall discovered highly sophisticated listening devices placed aboard a modified Boeing 767 intended for his use. Interestingly, it also describes an incident that occurred in this country in 1996.

Remember the Norinco/Poly Technologies Affair

On that occasion, a “princeling” — the term applied to family members of the PRC leadership who exploit their powerful “connections” to profit in business — was about to be nabbed by American law enforcement authorities.1 Wang Jun had been identified in a sting operation as the prime-mover behind an arms smuggling network involving two Chinese companies called Norinco and Poly Technologies that intended to put two thousand Chinese-made AK-47 automatic rifles into the hands of American street gangs. Worse yet, the well-connected entrepreneur expressed a willingness to provide even more formidable firepower, including anti-tank weapons, shoulder-fired surface-to-air missiles and armored vehicles, to the drug lords he thought were his customers.

Shortly before the princeling arrived in this country to consummate the initial deal — at which point he was expected to face prompt arrest, interrogation and prosecution — someone leaked the story to the American press. He never set foot on U.S. soil, escaped American justice and spared both his own government and the Clinton Administration the problem of trying to limit the damage such an affair would inevitably cause Sino-American relations.

At the time, furious law enforcement personnel let it be known that they thought the sting had been deliberately compromised by American officials in the White House or State Department. The actual facts in this case have never come to public light. But the earlier episode inspires a question about the compromise of the “bugs” on China’s “Air Force One”: Might someone privy to what was, presumably, a tightly compartmented U.S. intelligence operation have deliberately tipped the Chinese off to the fact that their new presidential aircraft was wired for sound?

Inquiring Minds Need to Know

To be sure, the PRC — which is said to have discovered these “state-of-the-art,” “satellite- activated” listening devices within a month of the plane’s delivery last September — is putting out the word that the bugs were discovered when they began emitting static during flight trials. Alternatively, Chinese counter-intelligence may have detected their presence during a routine electronic “sweep” of the new plane.

Still, if one reflects on the kinds of things that might have been learned from monitoring President Jiang’s unguarded conversations, it would appear that “Friends of China” would have even more to be concerned about in this instance than if the gun-runner with close times to the regime in Beijing had been successfully apprehended.

For example, what if Jiang were overheard confirming arrangements for further Chinese transfers of missile- and/or nuclear-related technology to clients like Pakistan, North Korea, Iran or Iraq, who may be U.S. targets before the war on terrorism is over? What if he were overheard outlining Beijing’s plans for expanding its hegemonic influence in the Pacific rim, at the expense of the United States, its allies and interests?

Or perhaps we might have secured confirmation of insidious Chinese activities in our own hemisphere. He may have shed important light on the PRC’s role in supporting Colombia’s Marxist narco-traffickers known as the FARC, its connections to the ever-more-despotic Hugo Chavez, who has announced his desire to replicate the Maoist revolution in Venezuela, or its plans for expanding China’s military and intelligence “footprint” beyond the electronic listening facility it is using to “bug” the United States from Fidel Castro’s Cuba.

We might also have received evidence that previous threats made by senior military officers to use China’s modernizing offensive ballistic missile force to attack Los Angeles or other American targets were not unauthorized statements by “rogue” officers, but reflect official policy for dealing with what the Communists call “the main enemy,” namely the United States.

The Bottom Line

It is, of course, possible that the Chinese found the bugs all by themselves. It may even be, as some are speculating, that Jiang’s plane was wired by domestic rivals jockeying to succeed him. One thing is clear, however: “Friends of China” are doubtless breathing a sigh of relief that they are not having to do what the Clinton Administration routinely did — “spin,” conceal or otherwise apologize for hard evidence that China is no friend of the United States.

A thorough investigation should be conducted to determine whether an American with such sentiments might have compromised the operation that would have collected this sort of unwanted evidence. Unfortunately, the logical place for such a review, the President’s Foreign Intelligence Advisory Board (PFIAB), seems ineligible to conduct it since the Board is now chaired by one of China’s best American friends, former National Security Advisor Brent Scowcroft.

Certainly it is to be hoped that, when President Bush heads to China next month, he will not express any regret to his hosts over a failed U.S. intelligence operation. The only cause for regret, as with the foiled sting aimed at the princeling gun-runner, is that the United States was denied insights it urgently needs into the PRC’s true character and agenda.




1 See, the William J. Casey Institute Perspective entitled, “Non-Renewal of M.F.N. For China: A Proportionate Response to Beijing’s Emerging, Trade-Subsidized Strategic Threat” (No. 97-C 76, 09 June 1997).

Center for Security Policy

Please Share:

Leave a Reply

Your email address will not be published. Required fields are marked *